153
Views
6
CrossRef citations to date
0
Altmetric
Articles

An ECC-based secure EMR transmission system with data leakage prevention scheme

, &
Pages 367-383 | Received 03 Jan 2014, Accepted 08 Aug 2014, Published online: 17 Sep 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Vankamamidi S. Naresh, Sivaranjani Reddi & Nistala V.E.S. Murthy. (2020) Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie–Hellman for wireless sensor networks. Information Security Journal: A Global Perspective 29:1, pages 1-13.
Read now

Articles from other publishers (5)

L. Raji & S. Thanga Ramya. (2022) Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC . Transactions on Emerging Telecommunications Technologies 33:9.
Crossref
Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami & Muhammad Ayaz. (2021) A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 9, pages 57792-57807.
Crossref
Zihan Jiao, Yindong Xiao, Yanmei Jin, Xinyu Chen & Xiwei Huang. (2020) Tianxia120: A Multimodal Medical Data Collection Bioinformatic System for Proactive Health Management in Internet of Medical Things. Journal of Healthcare Engineering 2020, pages 1-11.
Crossref
Ugo Fiore, Aniello Castiglione, Alfredo De Santis & Francesco Palmieri. (2017) Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices. IEEE Transactions on Sustainable Computing 2:2, pages 90-99.
Crossref
Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu & Ilsun You. (2016) TTP Based High-Efficient Multi-Key Exchange Protocol. IEEE Access 4, pages 6261-6271.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.